Abstract

Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered. In this paper, we outline the privacy issues of honeypots and honeynets with respect to their technical aspects. The paper discusses the legal framework of privacy and legal grounds to data processing. We also discuss the IP address, because by EU law, it is considered personal data. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues.

Highlights

  • The landscape of cybersecurity threats is continuously evolving and reactive security measures are often not sufficient for protecting information infrastructures

  • One of the major legal issues is the issue of privacy, which we address in this paper

  • 3.2 Basic concepts of personal data protection we present several basic concepts of the European personal data protection system, which are relevant for honeypots and their functions and data processing

Read more

Summary

Introduction

The landscape of cybersecurity threats is continuously evolving and reactive security measures are often not sufficient for protecting information infrastructures. One of the most popular method of learning about attackers is using honeypots. Spitzner defines honeypots as an information system resource whose value lies in an unauthorized or illicit use of that resource [1]. It can be defined as a computing resource whose value is in being attacked [2]. One of the major legal issues is the issue of privacy, which we address in this paper This issue influences how a honeypot can be deployed, what data they are allowed to collect, and what we can do with the collected data. To formalize the scope of our work, two research questions are stated: 1. What data are legally allowed to be collected by honeypots?

What are the legal conditions for the collection of data and data retention?
Legal framework of privacy and personal data protection in EU law
Other privacy issues
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call